Finding and fixing vulnerabilities in information systems : (Record no. 300488)

MARC details
000 -LEADER
fixed length control field 03868cam a2200577 i 4500
001 - CONTROL NUMBER
control field rnd000000000071852
003 - CONTROL NUMBER IDENTIFIER
control field RAND
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20160615135114.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 031125s2003 caua b 000 0 eng d
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2003012342
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0833034340 (pbk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0833035991 (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780833034342
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780833035998 (electronic bk.)
027 ## - STANDARD TECHNICAL REPORT NUMBER
Standard technical report number RAND/MR-1601-DARPA
035 ## - SYSTEM CONTROL NUMBER
System control number (Sirsi) a441334
037 ## - SOURCE OF ACQUISITION
Terms of availability $24.00
Form of issue paperback
040 ## - CATALOGING SOURCE
Original cataloging agency CstmoR
Transcribing agency CstmoR
043 ## - GEOGRAPHIC AREA CODE
Geographic area code n-us---
049 ## - LOCAL HOLDINGS (OCLC)
Holding library Alfaisal Main Library
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
Item number F525 2003
245 00 - TITLE STATEMENT
Title Finding and fixing vulnerabilities in information systems :
Remainder of title the vulnerability assessment and mitigation methodology /
Statement of responsibility, etc Philip S. Anton ... [et al.].
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE STATEMENTS
Place of production, publication, distribution, manufacture Santa Monica, CA :
Name of producer, publisher, distributor, manufacturer RAND,
Date of production, publication, distribution, manufacture 2003.
300 ## - PHYSICAL DESCRIPTION
Extent xxvi, 117 pages :
Other physical details illustrations ;
Dimensions 28 cm
336 ## - CONTENT TYPE
Content Type Term text
Content Type Code txt
Source rdacontent
337 ## - MEDIA TYPE
Media Type Term computer
Media Type Code c
Source rdamedia
337 ## - MEDIA TYPE
Media Type Term unmediated
Media Type Code n
Source rdamedia
338 ## - CARRIER TYPE
Carrier Type Term online resource
Carrier Type Code cr
Source rdacarrier
338 ## - CARRIER TYPE
Carrier Type Term volume
Carrier Type Code nc
Source rdacarrier
500 ## - GENERAL NOTE
General note "National Defense Research Institute."
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references (p.115-117).
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Introduction -- Concepts and Definitions -- VAM Methodology and Other DoD Practices in Risk Assessment -- Vulnerability Attributes of System Objects -- Direct and Indirect Security Techniques -- Generating Security Options for Vulnerabilities -- Automating and Executing the Methodology: A Spreadsheet Tool -- Next Steps and Discussion -- Summary and Conclusions -- Appendix: Vulnerability to Mitigation Map Values.
520 ## - SUMMARY, ETC.
Summary, etc Understanding an organization's reliance on information systems and how to mitigate the vulnerabilities of these systems can be an intimidating challenge--especially when considering less well-known weaknesses or even unknown vulnerabilities that have not yet been exploited. The authors, understanding the risks posed by new kinds of information security threats, build on previous RAND mitigation techniques by introducing the Vulnerability Assessment and Mitigation (VAM) methodology. The six-step procedure uses a top-down approach to protect against future threats and system failures while mitigating current and past threats and weaknesses. The authors lead evaluators through the procedure of classifying vulnerabilities in their systems' physical, cyber, human/social, and infrastructure elements, and identifying which security techniques can be relevant for these vulnerabilities. The authors also use VAM to break down information compromises into five fundamental components of attack or failure: knowledge, access, target vulnerability, non-retribution, and assessment. In addition, a new automated tool implemented as an Excel spreadsheet is discussed; this tool greatly simplifies using the methodology and emphasizes analysis on cautions, risks, and barriers.
530 ## - ADDITIONAL PHYSICAL FORM AVAILABLE NOTE
Additional physical form available note Also available on the internet via WWW in PDF format.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Command and control systems
General subdivision Security measures
Geographic subdivision United States.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures
Geographic subdivision United States.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Information services
General subdivision Security measures
Geographic subdivision United States.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Information superhighway
General subdivision Security measures
Geographic subdivision United States.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Information warfare
Geographic subdivision United States.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element National security
Geographic subdivision United States.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Risk assessment.
651 #0 - SUBJECT ADDED ENTRY--GEOGRAPHIC NAME
Geographic name United States
General subdivision Defenses.
655 #7 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
Source of term local
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Antón, Philip S.
Relator term author.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Anderson, Robert H.
Fuller form of name (Robert Helms),
Dates associated with a name 1939-
Relator term author.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Mesic, Richard,
Dates associated with a name 1943-
Relator term author.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Scheiern, Michael L.
Relator term author.
710 ## - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element Rand eBooks.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="http://ezproxy.alfaisal.edu/login?url=http://www.rand.org/publications/MR/MR1601/">http://ezproxy.alfaisal.edu/login?url=http://www.rand.org/publications/MR/MR1601/</a>
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Library of Congress Classification
Koha item type eBooks

No items available.

Copyright © 2020 Alfaisal University Library. All Rights Reserved.
Tel: +966 11 2158948 Fax: +966 11 2157910 Email:
librarian@alfaisal.edu